Securing Edge Applications

Highlights from a new survey of IT leaders on the future of edge security 

Distributed data demands distributed defense

IoT, robotics, AR/VR are driving distributed compute, network and storage, extending the enterprise perimeter across broader expanses.

Edge-based applications and data now extend beyond and between existing on-prem and cloud-based computing. This new infrastructure paradigm requires a holistic/integrated security approach that covers gaps in hybrid infrastructure with built-in threat protection. Read what 1.1K+ IT leaders in 10 countries are looking for in edge security.


IT Pros have significant concerns about security at the edge.

The perimeter is not enough

Security measures need to extend data and application protection to any on- or off-premises location across the entire hybrid infrastructure and beyond.


of organizations strongly or somewhat agree that perimeter-based security is no longer sufficient to protect business, employees, and customers from cyber-attacks.

Don’t rely on 5G alone

As 5G integration grows, most ITDMs in general lack confidence in using 5G networks and don’t really trust current 5G security.


of organizations have significant security concerns about using 5G networks.

Edge security takes end-to-end management

The complexity of managing the real time security and latency demands inherent to Edge infrastructure and 4IR technologies requires integration and coordination resources most businesses simply don’t have access to internally.


of organizations strongly or somewhat agree they need a technology partner that can help them better understand Edge Computing and how we can best harness Edge Solutions for our business.

Edge protection begins with partnership

As latency-sensitive, data-intensive apps push edge computing security measures across distributed networks, IT leaders are looking for vetted partners for protection.

XX% of organizations say Edge must be secured with data and application security services (e.g. WAF, Botnet protection, DDos mitigation) before they’d considering purchasing it.
XX% of orgs say they need built in security.
XX% of organizations agree that Integrated security services are a must-have capability for deploying apps to the cloud edge.

Integrated security and intelligence for your edge apps and data

Lumen delivers built-in, automated security solutions for Edge Bare Metal, Edge VM and the private cloud infrastructure to protect distributed applications against cyberattacks before they do harm.

Read the full report to see how your security strategy at the edge measures up. 

Get the full report